Pages:
Author

Topic: What ELSE could ASIC Mining devices be used for (Theoretical) (Read 13507 times)

legendary
Activity: 966
Merit: 1000
If it isn't hardware disabled, this could be something intelligence agencies (or bad guys) might like to get their hands on.

That's a new business niche for all the GPU farms that are going out of BTC business.

I understand there are already ppl doing this as a security auditing service for WPA keys and such.
legendary
Activity: 1204
Merit: 1002
RUM AND CARROTS: A PIRATE LIFE FOR ME
If it isn't hardware disabled, this could be something intelligence agencies (or bad guys) might like to get their hands on.

That's a new business niche for all the GPU farms that are going out of BTC business.
hero member
Activity: 896
Merit: 532
Former curator of The Bitcoin Museum
If it isn't hardware disabled, this could be something intelligence agencies (or bad guys) might like to get their hands on.
sr. member
Activity: 336
Merit: 250
There was once a mention by BFL that the ASIC can also do some type of password cracking, but they disabled it so as to not run into any export restrictions.
But no mention whether it is hardware disabled or firmware disabled.
hero member
Activity: 896
Merit: 532
Former curator of The Bitcoin Museum

Theoretically, you could invent a problem that is almost identical to Bitcoin block hashing, but it's unrealistic to expect to find an existing problem that fits that criterion.


Cheers Smiley

This was the kinda back 'n' forth I was looking for.  Information and discussion.  Not these twats that just jump on and yell IT'S IMPOSSIBLE!

Thanks bud!   Grin
hero member
Activity: 938
Merit: 1002

I guess you're forgetting these ASICs will take a fixed length hex word describing a bitcoin block header and they output a nonce. They do not try to solve random length passwords or anything like that...

what's a nonce?

That's the number you are trying to find, it's what mining is all about. You try to find a number (nonce) that will make the block hash value lower than the target value.

https://en.bitcoin.it/wiki/Nonce

I would read the related articles as well.

Theoretically, you could invent a problem that is almost identical to Bitcoin block hashing, but it's unrealistic to expect to find an existing problem that fits that criterion.
hero member
Activity: 896
Merit: 532
Former curator of The Bitcoin Museum

I guess you're forgetting these ASICs will take a fixed length hex word describing a bitcoin block header and they output a nonce. They do not try to solve random length passwords or anything like that...

what's a nonce?
-ck
legendary
Activity: 4088
Merit: 1631
Ruu \o/
Is there anything else out there that uses DBL SHA-256?
Just once more for good measure: NO

Not true, double sha-256 is actually used for many things. There is plenty of software/websites that use it to store passwords in databases, such as:

http://www.clipperz.com/security_privacy/crypto_algorithms
I guess you're forgetting these ASICs will take a fixed length hex word describing a bitcoin block header and they output a nonce. They do not try to solve random length passwords or anything like that...
sr. member
Activity: 336
Merit: 250
I guess the only real answer: we will find out once the ASIC becomes obsolete for Bitcoin mining.
hero member
Activity: 896
Merit: 532
Former curator of The Bitcoin Museum
How much would it cost per day to run it at 1.21 Gigawatts?

I believe you mean jiggawatts Tongue
hero member
Activity: 576
Merit: 500
Theoretically by adding a flux capacitor and a delorean it could become a time machine
But in reality - it has a single purpose - crunching double sha256

How much would it cost per day to run it at 1.21 Gigawatts?
hero member
Activity: 882
Merit: 1006
Wow, your website needs 60 Billion encryptions per second? Or even 4.5? You must be bigger than google.

If you read again, you'll notice the question I was answering was:

Is there anything else out there that uses DBL SHA-256?

Anyways, to answer your question, no, I don't think there is any website/software/business out there that would need an ASIC just to do password hashing, but a hacker trying to brute-force a password database would need something like 60 billion hashes a sec.
hero member
Activity: 896
Merit: 532
Former curator of The Bitcoin Museum

Not true, double sha-256 is actually used for many things. There is plenty of software/websites that use it to store passwords in databases, such as:

http://www.clipperz.com/security_privacy/crypto_algorithms

Cool!

I knew bitcoin wasn't the only thing on the planet to use this type of 11 year CIA encryption Smiley


This is pretty interesting...
http://www.clipperz.com/security_privacy/crypto_algorithms/sha_2_secure_hash_algorithms

sr. member
Activity: 350
Merit: 250
Is there anything else out there that uses DBL SHA-256?
Just once more for good measure: NO

Not true, double sha-256 is actually used for many things. There is plenty of software/websites that use it to store passwords in databases, such as:

http://www.clipperz.com/security_privacy/crypto_algorithms
Wow, your website needs 60 Billion encryptions per second? Or even 4.5? You must be bigger than google.

The problem to most uses of double SHA-256 is the scale difference. Nobody is going to spend $1300 on some thing that they can do with a CPU without noticing the load.

The only workload being built today that can leverage the ASICs in the pipeline today is AltCoins. Some like PPCoin are even avoiding merged mining, which means that you should be able to follow an optimal difficulty path if you really want to have alternatives.
hero member
Activity: 882
Merit: 1006
Is there anything else out there that uses DBL SHA-256?
Just once more for good measure: NO

Not true, double sha-256 is actually used for many things. There is plenty of software/websites that use it to store passwords in databases, such as:

http://www.clipperz.com/security_privacy/crypto_algorithms
-ck
legendary
Activity: 4088
Merit: 1631
Ruu \o/
Is there anything else out there that uses DBL SHA-256?
Just once more for good measure: NO
hero member
Activity: 896
Merit: 532
Former curator of The Bitcoin Museum
Application specific means it can only be used for bitcoin mining, nothing else.

This has been said time and time again.

And you absolutely had to say it again.

If anyone else wants to jump on and say it's impossible, don't bother.  We've already heard that. Cuz I can guarantee you, if there is a powerful device out there that becomes obsolete and may be destined to sit around, SOMEBODY will figure out a way to repurpose it.

I'm only interested in learning more, and getting ideas.


It depends if the application is a custom build from the ground up, or if it uses existing standards that are used by other applications.
Bitcoin mining uses SHA256 processing, so it can processes SHA256 of other applications where the work is similar.
However BFL locks their firmware Bitstream, and they would have to open-source it before anyone can try to do anything else with the ASIC.

Awesome, some useful information with a point.  So what you're saying is until these devices are released, and/or the source becomes open, no one could really know.

Is there anything else out there that uses DBL SHA-256?

What if somebody built a tech AROUND the ASIC devices? Possible or not?
sr. member
Activity: 336
Merit: 250
Application specific means it can only be used for bitcoin mining, nothing else.

This has been said time and time again.

It depends if the application is a custom build from the ground up, or if it uses existing standards that are used by other applications.
Bitcoin mining uses SHA256 processing, so it can processes SHA256 of other applications where the work is similar.
However BFL locks their firmware Bitstream, and they would have to open-source it before anyone can try to do anything else with the ASIC.
sr. member
Activity: 373
Merit: 250
Application specific means it can only be used for bitcoin mining, nothing else.

This has been said time and time again.
sr. member
Activity: 336
Merit: 250
APPLICATION SPECIFIC
APPLICATION SPECIFIC
APPLICATION SPECIFIC
APPLICATION SPECIFIC
APPLICATION SPECIFIC
APPLICATION SPECIFIC!!!!!

Your mum was application specific too, and I was still able to get her to do other things.

Ya unhelpful knob

It can do double SHA256 while on your desk.
It can also do double SHA256 while on a shelf.
The engineers have also taken great care to make sure that it can do double SHA256 while you eat a sandwich.

With enough modifications, it could serve as a doorstop or a paperweight, but I fear the warranty may be voided.


I would not like them here or there.
I would not like them anywhere.
I do not like non-application specific tasks and mods.
I do not like them ASIC I Am.

 Cool

Hmm doesnt quite flow well :/
Pages:
Jump to: